Clustering-based Query Result Authenticaion for Encrypted Databases in Cloud

被引:1
|
作者
Jang, Miyoung [1 ]
Yoon, Min [1 ]
Youn, Deulnyeok [1 ]
Chang, Jae-Woo [1 ]
机构
[1] Chonbuk Natl Univ, Dept Comp Engn, Jeonju, South Korea
关键词
Database outsourcing; database transformation technique; query result integrity auditing method; hash-based signature index;
D O I
10.1109/HPCC.2014.181
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to advancement in cloud computing technology, the research on the outsourced database has been spotlighted. Consequently, it is becoming more important to guarantee the correctness and completeness of query result in this environment. The existing data encryption schemes do not consider data distribution when encrypting original data. And existing query result integrity methods have limitation of verification object transmission overheads. To resolve these problems, we propose a clustering-based data transformation technique and a privacy-aware query authentication index. Our clustering-based data transformation scheme is designed to select anchors based on data distribution. For the integrity of query results, our query result authentication index stores an encrypted signature for each anchor and compares the anchor signature with the verification data from the data owner. Through performance evaluation, we show that our method outperforms the existing method up to 15 times in terms of query processing time and verification.
引用
收藏
页码:1076 / 1082
页数:7
相关论文
共 50 条
  • [1] A Query Conversion Scheme for Encrypted Cloud Databases
    Xian, Hequn
    Li, Jing
    Lu, Xiuqing
    [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS (ITA), 2013, : 147 - 150
  • [2] Facilitating Secure Query Processing on Encrypted Databases on the Cloud
    Ben Omran, Osama M.
    Panda, Brajendra
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD), 2016, : 307 - 312
  • [3] Clustering-based fragmentation and data replication for flexible query answering in distributed databases
    Wiese L.
    [J]. Journal of Cloud Computing, 3 (1)
  • [4] Secure and Efficient Query Processing Technique for Encrypted Databases in Cloud
    Almakdi, Sultan
    Panda, Brajendra
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2019), 2019, : 120 - 127
  • [5] Access control enforcement on query-aware encrypted cloud databases
    Ferretti, Luca
    Colajanni, Michele
    Marchetti, Mirco
    [J]. 2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 2, 2013, : 717 - 722
  • [6] Clustering-Based IaaS Cloud Monitoring
    Abdelsalam, Mahmoud
    Krishnan, Ram
    Sandhu, Ravi
    [J]. 2017 IEEE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2017, : 672 - 679
  • [7] Clustering-Based Cloud Migration Strategies
    Aslam, Mubeen
    Rahim, Lukman Bin A. B.
    Watada, Junzo
    Hashmani, Manzoor
    [J]. JOURNAL OF ADVANCED COMPUTATIONAL INTELLIGENCE AND INTELLIGENT INFORMATICS, 2018, 22 (03) : 295 - 305
  • [8] Clustering-based compression connected to cloud databases in telemedicine and long-term care applications
    Hsu, Wei-Yen
    [J]. TELEMATICS AND INFORMATICS, 2017, 34 (01) : 299 - 310
  • [9] A Clustering-Based Approach to the Explanation of Database Query Answers
    Moreau, Aurelien
    Pivert, Olivier
    Smits, Gregory
    [J]. FLEXIBLE QUERY ANSWERING SYSTEMS 2015, 2016, 400 : 307 - 319
  • [10] Search Result Clustering Based on Query Context
    Meina, Michal
    Nguyen, Hung Son
    [J]. FUNDAMENTA INFORMATICAE, 2015, 137 (02) : 273 - 290